•  – Text content being typed
  •  – Before/after text values (diffing characters)
  •  – Package name and class name of the current app
  •  – Whether or not the “password” field is detected
  •  – Resource ID of the input field
  •  – SSO credentials can be compromised (Okta, Azure AD, Google) – including MFA protected passwords. The attacker gets the password and they can view the MFA approval in real time.
  •  – Search queries in corporate systems can reveal customer PII, internal project names, etc.
  •  – Team communications through Slack, Teams, or email is captured before the message is sent.
  •  – Form submissions in any SaaS tool, CRM data entries, logins, etc can be compromised.
  •  – PIN Mode: A 6-digit entry screen with numeric keypad and fake biometric prompt.
  •  – Password Mode: A dark themed AUTHENTICATION password field.
  •  – Whatsapp
  •  – Paypal
  •  – Revolut
  •  – N26
  •  – Fake System Update: A convincing Android OS update screen with offical branding and logos, an animated progress bar which lasts 5 minutes, and rotating status messages for added legitimacy. All audio streams are muted while this occurs.
  •  – Black Screen: Simple pure black screen with no UI elements.
  •  – Extended data exfiltration: If the attacker wants to exfiltrate larger files undetected, this is the perfect method, as it allows the attacker 5 minutes of free reign.
  •  – Account manipulation: The attacker can modify account permissions, generate API keys, change passwords, etc, all while remaining invisible to the user.
  •  – Evidence destruction: Clearing log files, search history, sent messages.
  •  – Dropping more malware: The attacker can easily manually install and setup a different malware on the device if they so please while the fake update is occurring.

Jack Lewis

Jack is a security researcher with a strong focus on malware analysis, tracking new threat actors and campaigns, reverse engineering, patch diffing, and proactive threat hunting.

×

Under attack? Call our 24/7 Incident Response Hotline now

Get in touch with an accredited Incident Response experts who can help you contain, recover and mitigate attacks.

0333 987 4048

For regular switchboard please
contact - 0333 939 8080